СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 326
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Counterterrorism and Cybersecurity
/ Комментариев: 0/

Название: Counterterrorism and Cybersecurity
Автор: Newton Lee
Издательство: Springer
Год: 2013
Формат: PDF, EPUB
Размер: 10 Мб
Язык: английский / English

Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security+ Guide to Network Security Fundamentals, Third Edition
/ Комментариев: 0/


Название: Security+ Guide to Network Security Fundamentals, Third Edition
Автор: Mark Ciampa
Издательство: Course Technology, Cengage Learning
Год: 2009
Формат: PDF
Для сайта: mirlib.ru
Страниц: 590
Размер: 11,58 МБ
Язык: English

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Malware Diffusion Models for Modern Complex Networks
/ Комментариев: 0/

Название: Malware Diffusion Models for Modern Complex Networks
Автор: Vasileios Karyotis and M.H.R. Khouzani
Издательство: Morgan Kaufmann
Год: 2016
Формат: PDF
Размер: 10 Мб
Язык: английский / English

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Wireless Personal Communications: Simulation and Complexity
/ Комментариев: 0/

Название: Wireless Personal Communications: Simulation and Complexity
Автор: Mohsen A. M. El-Bendary
Издательство: Springer
Год: 2018
Формат: EPUB, PDF
Размер: 16 Мб
Язык: английский / English

This book introduces wireless personal communications from the point of view of wireless communication system researchers. Existing sources on wireless communications put more emphasis on simulation and fundamental principles of how to build a study model. In this volume, the aim is to pass on to readers as much knowledge as is essential for completing model building of wireless communications, focusing on wireless personal area networks (WPANs).


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
IPv6 Address Planning
/ Комментариев: 0/

Название: IPv6 Address Planning
Автор: Tom Coffeen
Издательство: O'Reilly Media
Год: 2014
Формат: PDF, EPUB
Размер: 30 Мб
Язык: английский / English

If you’re ready to join the move to IPv6, this comprehensive guide gets you started by showing you how to create an effective IPv6 address plan. In three example-driven sections—preparation, design, and maintenance—you’ll learn principles and best practices for designing, deploying, and maintaining an address plan far beyond what’s possible with IPv4 networks.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Mobile Marketing: How Mobile Technology is Revolutionizing Marketing, Communications and Advertising
/ Комментариев: 0/

Название: Mobile Marketing: How Mobile Technology is Revolutionizing Marketing, Communications and Advertising
Автор: Daniel Rowles
Издательство: Kogan Page
Год: 2017
Формат: PDF, EPUB
Размер: 16 Мб
Язык: английский / English

Mobile Marketing is a clear, practical guide to harnessing the mobile consumer and tackling the rising challenges of divided user attention across multiple screens at the same time. It demystifies the vast spectrum of tools and techniques now available and explains how to optimize these dynamics into an innovative and effective mobile marketing strategy. Now that website search rankings take into account mobile optimization, no serious marketer can do without a thorough understanding of mobile.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cisco VPN Configuration Guide
/ Комментариев: 0/

Название: Cisco VPN Configuration Guide
Автор: Harris Andrea
Издательство: CreateSpace Independent Publishing Platform
Год: 2014
Формат: PDF, EPUB
Размер: 22 Мб
Язык: английский / English

Become an expert in Cisco VPN technologies with this practical and comprehensive configuration guide. Learn how to configure IPSEC VPNs (site-to-site, hub-and-spoke, remote access), SSL VPN, DMVPN, GRE, VTI etc. This book is packed with step-by-step configuration tutorials and real world scenarios to implement VPNs on Cisco ASA Firewalls (v8.4 and above and v9.x) and on Cisco Routers. It is filled with raw practical concepts, around 40 network diagrams to explain the scenarios, troubleshooting instructions, 20 complete configurations on actual devices and much more. Both beginners and experts will find some golden nuggets inside this practical guide.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Bandwidth Efficient Coding
/ Комментариев: 1/

Название: Bandwidth Efficient Coding
Автор: John B. Anderson
Издательство: Wiley
Год: 2017
Формат: PDF, EPUB
Размер: 11 Мб
Язык: английский / English

Bandwidth Efficient Coding takes a fresh look at classical information theory and introduces a different point of view for research and development engineers and graduate students in communication engineering and wireless communication.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain Basics A Non-Technical Introduction in 25 Steps
/ Комментариев: 0/

Название: Blockchain Basics: A Non-Technical Introduction in 25 Steps
Автор: Daniel Drescher
Издательство: Apress
Год: 2017
Формат: PDF, EPUB
Размер: 10 Мб
Язык: английский / English

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used.No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Walling Out the Insiders: Controlling Access to Improve Organizational Security
/ Комментариев: 0/

Название: Walling Out the Insiders: Controlling Access to Improve Organizational Security
Автор: Michael Erbschloe
Издательство: CRC Press
Год: 2017
Формат: PDF, EPUB
Размер: 19 Мб
Язык: английский / English

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.